Acronis Cyber Protection Solutions deliver outstanding defense in depth (DiD) threat protection via a set of smartly integrated technologies, each of which works to prevent possible threats along dedicated stages.
Full stack protection technologies
Contains AI-, behavior- and signature-based detection and response
Secuirty against any threat
Protects against known, unknown malware and ransomware, and fileless attacks
Combat emergin threats
Uses behavioral heuristics and dynamic detection rules to combat emerging threats
Detect any kind of malware
Scans files for trojans, viruses, backdoors, worms, keyloggers, spyware, and others
What is malware?
Malware is malicous software that is intentionally designed to damage a system or steal data. Malware is most often used by cybercriminals for financial gain, but can also be distributed as a form of protest or as an offensive weapon in the state-sponsored attacks that have become increasingly popular. Common forms of malware include viruses, trojans, worms, spyware, ransomware, botnets and any other type of potentially unwanted application.
Damages a system or steals data
Used by cybercriminals for financial gain
Includes viruses, trojans, worms, spyware, ransomware, etc.
Effectiveness proven by independent testing laboratories
Acronis scored a 98.0% detection rate in a real-world test, but more importantly, it caused zero false positives – a distinction held by only three other vendors in the test.
Virus Bulletin extends their congratulations to Acronis who are newcomers to the VB100 certification, achieving their first certification at 100% malware detection + 0% false-positive rate on our certification sets.
Acronis’s endpoint anti-malware product provided very good real-time protection against malware known to exist on systems worldwide. Acronis Cyber Protect Cloud had no false positives on any of the thousands of innocuous files used in testing.
Acronis Cyber Protection Solutions employ multiple defense layers to protect users against any cyber threat whether it leverages website connection, zero-day exploits, malicous injections, obfuscated malware, or other advanced malicous techniques that bypass traditional antiviruses such as fileless attacks.
AI-enhanced web security to stop online attacks
Since the majority of threats come from the internet, it is essential to control access to specific websites that are known to be unsafe and to legitimate websites that may have been compromised and now contain malicous content.
Acronis Web Security delivers a URL analysis and filtering functionality from its cloud reputation database (Acronis Cloud Brain). Local detection rules for malicious and phishing URLs are kept in Acronis Cyber Protection Solutions, ensuring protection even when there are disruptions to the internet connection.
Acronis URL filtering is enhanced with payload analysis and a machine learning model, which analyzes both the link itself and the page’s structure.
Stops drive-by downloads
Intercepts HTTP/HTTPS requests and stops attempts to silently download malware
Blocks malicous websites
Protects against any phishing sites and blocks sites that distribute malware
Focus on current cyber threats
Identifies scams using themes that leverage actual threats, such as COVID-19
Extensive threat intelligence
Integrates intelligence from industry partners into Acronis’ detection technologies
Acronis multilayered cybersecurity
Understand how Acronis uses multiple defense layers to prevent, detect, and respond to modern cyber threats.
Zero-day exploit prevention to cover unknown vulnerabilities
When not delivered via malicious links and attachments, malware often infects machines via unpatched vulnerabilities. The most dangerous ones are zero-day vulnerabilities, for which no patch exists to fix the flaw.
Exploit Prevention is a very important part of Acronis multilayered, next-generation protection: specifically tracking and detecting malware that attempts to take advantage of software vulnerabilities. It uses behavior-based detection heuristics that are crafted with vulnerability exploitation in mind.
Covers unpatched vulnerabilities so dangerous malware can’t exploit them
Protection against any exploit
Is effective against every known exploit technique, including memory exploits
Behavior-based exploit prevention
A special set of behavioral heuristics that’s constantly updated by Acronis experts
Prevent fileless exploits
Works well against fileless attacks, that signature-based techniques can’t detect
Acronis Cloud Brain: fast signature-based cloud detection
Acronis harnesses the power of cloud-delivered detection through its network of data centers around the globe. When the Acronis Cyber Protection agent on an endpoint device detects something suspicious, metadata is sent to the cloud for additional analysis and research, including sandboxing, AI-enabled processing, and so on. More sophisticated threats can be analyzed by a human expert as well. A detection record is then created, which becomes instantly available to all other endpoints that are connected to the Acronis Cloud.
Signature-based detection gives you additional reassurance against all known threats, since you still occasionally encounter them. To make the detection process faster, most of cloud-, behavioral-, and AI-based detections eventually become signatures as well.
Globally updated signatures
Faster access in every region due to Acronis data centers located around the globe
New detections are available for every customer within minutes of the first encounter
AI-enabled data processing
More effective detection models, thanks to AI-enabled data processing
Zero false positives
Increased accuracy of false free verdicts due to whitelisting, sandboxing, etc.
NextGen AI-based static and injection detection
Acronis Static AI Analyzer uses a unique set of parameters to examine Windows executables and dynamic link libraries (DLLs) to determine whether or not a process is malicious. The machine learning (ML) model is trained on both malicious and clean files in the Acronis Cloud Brain, which has already processed dozens of millions of files (while evaluating details such as the presence and validity of a digital certificate). Files are constantly analyzed in the Acronis Cloud Brain where the ML model is also trained via sandboxes and other security tools.
Another AI model is responsible for detecting malicious injections into legitimate processes: a complex technique currently used by many sophisticated types of malware.
Read more on how Acronis AI-technologies help in other security areas.
Helps confirm malicous processes and injections into legitimate ones
Static AI analyzer
Detect malware triggered without execution
Defense in depth
Different models are used to effectively detect different threats
New models are tested every hour to improve efficiency and combat evolving threats
Powerful behavioral heuristics to catch sophisticated threats
Acronis’ behavioral engine analyzes suspicious kernel-level events, as well as events coming from the Windows operating system. These heuristic rules are easily updatable, enabling Acronis’ security specialists to quickly react to new, developing threats.
The behavioral engine is a very powerful tool for detecting fileless threats such as memory or script-based attacks, which are often used as a part of an APT invasion.
Effectively deals with fileless attacks and various exploit prevention techniques
Dynamic detection rules
Protection against polymorphic and obfuscated malware
Smart protection plans
Can be updated at any moment to add protection against new, emerging threats
Global and local whitelists for aggressive scans with zero falso positives
To detect and prevent more complex threats, it’s important to allow your antimalware solution to make more aggressive heuristic choices. The more aggressive the heuristics are, however, the more false-positives are introduced, which reduces the productivity rate.
To maintain the appropriate balance between aggressively detecting malware and minimizing false positives, Acronis Cyber Protection Solutions allow you to create automatic whitelists of the applications you use on a daily basis. Unlike traditional global whitelisting, our technique supports custom applications, reaching zero false positives in independent tests. You can also manually whitelist applications when needed.
Improved detection rate
More aggressive behavioral heuristics for more effective detection of malware
Automatically whitelists applications for time-efficiency
Supports manual whitelisting, if needed
Zero false positives
Proven zero false positives by independent third party tests